Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 12:56
Static task
static1
Behavioral task
behavioral1
Sample
c76576cf5792152a337f63b170f771a0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c76576cf5792152a337f63b170f771a0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c76576cf5792152a337f63b170f771a0_NeikiAnalytics.exe
-
Size
33KB
-
MD5
c76576cf5792152a337f63b170f771a0
-
SHA1
898f9f92ef6d1c2db6080d85274d19610175f0d5
-
SHA256
2f2a49c4bf386d2a35688d33af7d46b404ac155faa67226e9a4e5f7eb4c35c32
-
SHA512
d0e119f9c1baf77f40d79706907f30c7bc5c2bc7abb10794050b6a20933fa40bd211cea661430d6a7065b20fd81a641d9ffafc6b0f734e87ce9f843cb2befc47
-
SSDEEP
768:9qSqC8+N5ozQQqncwxWmNXMX3cX8wtgg/X/zCtgcgCEX8u/vSXrXrXrXrXrXy6:9rqfzQQqamN88Fr277777b
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2052 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2184 c76576cf5792152a337f63b170f771a0_NeikiAnalytics.exe 2184 c76576cf5792152a337f63b170f771a0_NeikiAnalytics.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\81cee8d\jusched.exe c76576cf5792152a337f63b170f771a0_NeikiAnalytics.exe File created C:\Program Files (x86)\81cee8d\81cee8d c76576cf5792152a337f63b170f771a0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe 2052 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2052 2184 c76576cf5792152a337f63b170f771a0_NeikiAnalytics.exe 28 PID 2184 wrote to memory of 2052 2184 c76576cf5792152a337f63b170f771a0_NeikiAnalytics.exe 28 PID 2184 wrote to memory of 2052 2184 c76576cf5792152a337f63b170f771a0_NeikiAnalytics.exe 28 PID 2184 wrote to memory of 2052 2184 c76576cf5792152a337f63b170f771a0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c76576cf5792152a337f63b170f771a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c76576cf5792152a337f63b170f771a0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\81cee8d\jusched.exe"C:\Program Files (x86)\81cee8d\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
33KB
MD529d7c627c19efb310c9dc9f79f5766b1
SHA16d85a944d19119292ea514beb1edd7cfa291a5c8
SHA2560522edec9b998929e49651af311dce95cae220a531c5fa9f97e9b9b3271f2006
SHA51291f2ba6ce905503b00c58b4e974bf41d3ffcb008289b6b3cdb55ba97367ee0e02f71c51e9809cbbb4d28cf455747a0b8c0f12d670eb89f484f3022f182cc7aa7